0000000000953189

AUTHOR

Suprateek Sarker

showing 5 related works from this author

Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective

2019

Practice-/policy-oriented abstract: Understanding why employees do or do not comply with information systems security (ISS) procedures is an imperative in today’s organizations whose futures often depend on how well they protect and harness information assets. We use a predominantly inductive approach to develop a theoretical understanding of how employees’ reasons for engaging to ISS behaviors (ISSBs) change over time, using ideas from dialectics as our scaffolding. Our dialectical view of this process suggests that explanations for engaging in different ISSBs change over time as individuals seek to balance contradictory demands. Furthermore, our view suggests that new experiences and ext…

DialecticInformation Systems and ManagementKnowledge managementComputer Networks and Communicationsbusiness.industry05 social sciencesPerspective (graphical)Information systems security02 engineering and technologyLibrary and Information SciencesManagement Information Systems020204 information systemsProcess theory0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingSociologybusinessFutures contractInformation SystemsInformation Systems Research
researchProduct

How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework

2017

Abstract The focus of this theoretical paper is to investigate how mobile information and communication technologies (ICTs) give rise to the notion of organizational fluidity. Drawing upon previous literature, five affordances of mobile ICTs − mobility, connectedness, interoperability, identifiability, and personalization − are discussed. Delving into the concept of organizational fluidity, the paper captures three dimensions of organizational fluidity, namely, team fluidity, task fluidity, and control fluidity. The paper then develops propositions on how different combinations of the mobile ICT affordances influence each of the dimensions of organizational fluidity. The contributions and i…

ta113EngineeringInformation Systems and ManagementKnowledge managementbusiness.industrySocial connectedness05 social sciencesInteroperability02 engineering and technologyManagement Information SystemsPersonalizationInformation and Communications Technologymobile information020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringICTSorganizational fluiditybusinessAffordancemobilization050203 business & managementcommunication technologieswork-processesInformation SystemsInformation & Management
researchProduct

Toward a stage theory of the development of employees’ information security behavior

2020

Existing behavioral information security research proposes continuum or non-stage models that focus on finding static determinants for information security behavior (ISB) that remains unchanged. Such models cannot explain a case where the reasons for ISB change. However, the underlying reasons and motives for users’ ISB are not static but may change over time. To understand the change in reasoning between different antecedents, we examine stage theorizing in other fields and develop the requirements for an emergent theory of the development of employees’ ISB: (1) the content of stages based on the stage elements and their stage-specific attributes; (2) the stage-independent element explaini…

organisaatiokäyttäytymineninformaatiokäyttäytyminenStage theoryoppiminenInformation securitytietoturvapolitiikkaLearningCompliance with information security policiesInformation security behaviortietoturva
researchProduct

Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process

2022

Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how much, depend upon a subjective assessment of the economic value of the investment and the likelihood of the damage to the organization. When managers delay or fail to decide on whether and how much to invest in IT security, it can make organizations vulnerable to operational and strategic perils. Based upon interviews, document reviews, and observations in three organizations in Finland that made ITSI decisions to acquire a secure email application system, we examined the …

behavioraljohtaminencybersecuritypäätöksentekorevelatory studyIT securitytietoturvatietotekniikkakyberturvallisuusdecision makinginvestoinnityrityksettietojärjestelmät
researchProduct

How Do Mobile ICTs Enable Organizational Fluidity : Toward a Theoretical Framework

2017

The focus of this theoretical paper is to investigate how mobile information and communication technologies (ICTs) give rise to the notion of organizational fluidity. Drawing upon previous literature, five affordances of mobile ICTs − mobility, connectedness, interoperability, identifiability, and personalization − are discussed. Delving into the concept of organizational fluidity, the paper captures three dimensions of organizational fluidity, namely, team fluidity, task fluidity, and control fluidity. The paper then develops propositions on how different combinations of the mobile ICT affordances influence each of the dimensions of organizational fluidity. The contributions and implicatio…

mobile informationorganizational fluiditymobilizationcommunication technologieswork-processes
researchProduct